CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 71


When auditing the security architecture of an online application, an IS auditor should FIRST review the:

Show Answer
Correct Answer: BD

When auditing the security architecture of an online application, the first step for an IS auditor should be to review the firewall standards. These standards define the rules, policies, and configurations governing the firewall’s operation. By assessing compliance with established standards, the auditor can gain insights into the effectiveness of the firewall’s design and implementation and ensure that it aligns with best practices and organizational requirements.

Discussion

18 comments
Sign in to comment
BroesweeliesOption: D
Feb 22, 2023

I am really blown away by everybody saying it is A. The config will tell you where and what the firewall does. Location of firewall means absolutely nothing. Physical location? I mean a firewall ALWAYS sits in front of your business network...

kGiGa
Aug 20, 2023

A firewall should protect the application against attacks from the Internet and also from the untrusted users inside the corporate network (internal hackers). Firewalls may be implemented using hardware or software platforms. The location, firewall type, and configuration is important.

DeeplaxmiOption: A
Sep 26, 2022

i also think A is correct bcos depending on the position and purpose of firewall the configuration will change.. so location of FW is imp.

MichaelHoangOption: A
Jan 13, 2023

whatever reviewing that you are doing, it is useless if you dont know what should be taken care by that device. It is very important to understand the location, the deployment and the protection that device is taking care for the organization. Hence, location of firewall must be identified first before anything else.

007GeorgeoOption: D
May 2, 2023

the key is online application

001YogeshOption: B
Dec 6, 2023

It should be B

dan08Option: B
Feb 22, 2024

When auditing the security architecture of an online application, the FIRST step for an IS auditor should be to review the firewall standards. These standards define the rules, policies, and configurations governing the firewall’s operation. By assessing compliance with established standards, the auditor can gain insights into the effectiveness of the firewall’s design and implementation.

ZephaniahOption: A
Sep 6, 2022

A. LOCATION, you may have the best configs, but location matters the most

Wakazdave
Sep 7, 2022

the architecture (configs) will determine where it is located.

David_HuOption: A
Jan 1, 2023

SUPPORT A

MohamedAbdelaalOption: D
Apr 26, 2023

First, you need to review the firewall configuration, then you will have to determine whether this configuration is suitable to where the firewall was placed or not.

RachyOption: B
Jan 25, 2024

Firewall Standard

LilikOption: A
Oct 16, 2022

I also vote for A because a firewall not connected to the Internet does not have the same risk as one that is connected to the Internet. This is because internal firewalls tend to be more permissive than external firewalls.

001YogeshOption: B
Dec 6, 2023

Surprise to see nobody talking about Firewall standard....I think it should be B. Based on standard only we can validate the configuration etc...

5b56aaeOption: A
Apr 20, 2024

location comes first

a84nOption: D
Apr 25, 2024

Answer: D

SwallowsOption: B
Jun 1, 2024

ChatGPT Reviewing firewall standards (option B) is indeed an important aspect of auditing the security architecture of an online application. Firewall standards provide guidelines and best practices for configuring, managing, and monitoring firewalls, which are critical components of network security. By reviewing firewall standards first, an IS auditor can establish a baseline understanding of the organization's firewall requirements and expectations.

shalota2Option: D
Jun 8, 2024

What is the purpose of reviewing configuration first when the firewall have been placed at the worng place? Of course when you audit a network security first thing you say to the the client you ask for the network topology to understand the how the devices are set up. When it comes to the MOST important I agree should be D.

RS66Option: A
Jun 26, 2024

I say A, by location they don't mean physical location. The FW should be placed the between public interface and private network. Location is key.

CyberNerd
Mar 28, 2025

The keyword here is Architecture, so the answer is A.